Skip to main content

Books in Social sciences and humanities

    • Mergers and Acquisitions Security

      • 1st Edition
      • April 18, 2005
      • Edward Halibozek + 1 more
      • English
      • Paperback
        9 7 8 0 7 5 0 6 7 8 0 5 6
      • eBook
        9 7 8 0 0 8 0 4 7 0 6 5 8
      In reaction to the continually changing business climate companies develop many business strategies to increase their competitiveness and improve profitability. Companies regularly reshape themselves continually exploring new markets and developing new products. When they can't expand into new markets or develop new products on their own, they seek alternatives. These alternatives include merging with or acquiring other companies to create a single more capable company. Companies acquire other companies for a wide variety of reasons. In some cases company survival may actually be the reason. What does this condition mean to the security professional? In the course of mergers and acquisitions, security plays a vital role in helping to make the endeavor successful. There are numerous titles on the business aspects of M&A such as the ones listed below. However, this unique book focuses on the role security plays in helping to make a merger, acquisition or divestiture successful. It addresses the fundamental security elements that are required to support the effort. In addition, it provides an integrated "how to" approach to implementing M&A security complete with methods and processes that have been quickly and cost-effectively implemented.
    • Implementing Database Security and Auditing

      • 1st Edition
      • April 18, 2005
      • Ron Ben Natan
      • English
      • Paperback
        9 7 8 1 5 5 5 5 8 3 3 4 7
      • eBook
        9 7 8 0 0 8 0 4 7 0 6 4 1
      This book is about database security and auditing. You will learn many methods and techniques that will be helpful in securing, monitoring and auditing database environments. It covers diverse topics that include all aspects of database security and auditing - including network security for databases, authentication and authorization issues, links and replication, database Trojans, etc. You will also learn of vulnerabilities and attacks that exist within various database environments or that have been used to attack databases (and that have since been fixed). These will often be explained to an “internals” level. There are many sections which outline the “anatomy of an attack” – before delving into the details of how to combat such an attack. Equally important, you will learn about the database auditing landscape – both from a business and regulatory requirements perspective as well as from a technical implementation perspective.
    • The Psychology of Media and Politics

      • 1st Edition
      • April 14, 2005
      • George Comstock + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 3 9 9 2 0 6 2
      • Hardback
        9 7 8 0 1 2 1 8 3 5 5 2 1
      • eBook
        9 7 8 0 0 8 0 4 5 4 2 5 2
      Research indicates that people discount their own opinions and experiences in favor of those of "experts" as espoused in the media. The framing of news coverage thus has a profound impact on public opinion, and political decision making as a response to public outcry. However, the choice of how to frame the news is typically made to solicit viewership and high ratings rather than to convey accurate and meaningful information. The Psychology of Media and Politics discusses why people discount their own opinions, how the media shapes the news, when this drives political decision making, and what the effect is on the future of society. Issues addressed include: How powerful are the media in shaping political beliefs/judgment? How has this power changed in recent years? How does media influence voting behavior? To what extent do media opinions affect political decision making?
    • Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

      • 1st Edition
      • April 12, 2005
      • James C Foster
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 0 5 4
      • eBook
        9 7 8 0 0 8 0 4 8 9 7 2 8
      The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:1. Coding – The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets – The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same – communication over TCP and UDP, sockets are implemented differently in nearly ever language. 3. Shellcode – Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access. 4. Porting – Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not “recreate the wheel.”5. Coding Tools – The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.
    • Cisco PIX Firewalls

      • 1st Edition
      • April 12, 2005
      • Umer Khan
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 0 0 4 7
      • eBook
        9 7 8 0 0 8 0 4 8 8 4 8 6
      Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 best-selling PIX book on amazon.com by providing readers with a clear, comprehensive, and independent introduction to PIX Firewall configuration. With the market for PIX Firewalls maintaining double digit growth and several major enhancements to both the PIX Firewall and VPN Client product lines, this book will have enormous appeal with the audience already familiar with his first book.
    • Software Piracy Exposed

      • 1st Edition
      • April 12, 2005
      • Ron Honick
      • English
      • Paperback
        9 7 8 1 9 3 2 2 6 6 9 8 6
      • eBook
        9 7 8 0 0 8 0 4 8 9 7 3 5
      This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy has reached epidemic proportions. Many computer users know this, the software companies know this, and once you've read the Introduction to this book, you'll understand why. Seeing how widespread software piracy is, learning how it's accomplished, and particularly how incredibly easy it is to do might surprise you. This book describes how software piracy is actually being carried out.
    • Innovation Happens Elsewhere

      • 1st Edition
      • April 11, 2005
      • Chris Meyer + 2 more
      • English
      • Hardback
        9 7 8 1 5 5 8 6 0 8 8 9 4
      • Paperback
        9 7 8 1 4 9 3 3 0 3 7 5 5
      • eBook
        9 7 8 0 0 8 0 5 3 4 6 7 1
      It's a plain fact: regardless of how smart, creative, and innovative your organization is, there are more smart, creative, and innovative people outside your organization than inside. Open source offers the possibility of bringing more innovation into your business by building a creative community that reaches beyond the barriers of the business. The key is developing a web-driven community where new types of collaboration and creativity can flourish. Since 1998 Ron Goldman and Richard Gabriel have been helping groups at Sun Microsystems understand open source and advising them on how to build successful communities around open source projects. In this book the authors present lessons learned from their own experiences with open source, as well as those from other well-known projects such as Linux, Apache, and Mozilla.
    • Forensic Pathology

      • 1st Edition
      • April 8, 2005
      • David Dolinak + 2 more
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 0 4 0 2
      • Hardback
        9 7 8 0 1 2 2 1 9 9 5 1 6
      • eBook
        9 7 8 0 0 8 0 4 7 0 6 6 5
      Forensic Pathology is a comprehensive reference that uses a case-oriented format to address, explain and guide the reader through the varied topics encountered by forensic pathologists. Developed in response to a severe void in the literature, the book addresses topics ranging from medicolegal investigation of death to death scene investigation, forensic autopsy, and artifacts of resuscitation as well as complications of medical therapy, forensic osteology, forensic odontology, forensic photography, and death certification. The book includes various types of cases, including sudden natural death, asphyxia, motor vehicle collisions, death in custody, child abuse and elder abuse, acute psychiatric and emotional deaths, and pregnancy. It contains sample descriptions of pathological lesions which serve to aid pathologists in reporting their findings to law enforcement agencies, attorneys, and others involved in investigations of sudden death. The concepts outlined in the text are beautifully illustrated by large, colorful photographs. There are also "Do and Don’t" sections at the end of each chapter that provide guidance for handling the types of cases examined. This work will benefit not only experienced forensic pathologists, but also hospital pathologists who occasionally performs medicolegal autopsies; doctors in training; medical examiners; law enforcement personnel; crime scene investigators; attorneys; and fellows and students of the medical sciences.
    • CCTV

      • 2nd Edition
      • April 5, 2005
      • Vlado Damjanovski
      • English
      • Paperback
        9 7 8 1 4 9 3 3 0 3 0 6 9
      • Hardback
        9 7 8 0 7 5 0 6 7 8 0 0 1
      • eBook
        9 7 8 0 0 8 0 4 7 2 1 9 5
      Closed circuit television (CCTV) is experiencing a leap in technology using digital techniques, networking and the Internet. The new edition of this high-level professional reference retains the particulars that made the first edition a success, including the details of CCD cameras, lenses, coaxial cables, fiber-optics, and system design, but it is expanded to cover all video compression techniques used in the ever increasing assortment of digital video recorders (DVRs) available on the market today. This new edition of the book CCTV demystifies DVR technology. It also serves to clarify the technology of data networking. The theoretical section explains the various compression techniques. Networking is also a new and unknown area for many CCTV installers and this is explained in a brand new section.
    • Enabling End-Users

      • 1st Edition
      • March 31, 2005
      • Ann Poyner
      • English
      • Hardback
        9 7 8 1 8 4 3 3 4 1 0 9 3
      • Paperback
        9 7 8 1 8 4 3 3 4 1 0 8 6
      • eBook
        9 7 8 1 7 8 0 6 3 0 7 8 6
      This introductory book suggests ways of approaching some of the problems library and information professionals face as they prepare to offer end user education or training through personal tuition. Advice is given about how to take stock of existing library and information services in relation to their place and value within organisations. It examines issues about who needs end user education and training, what they might need and how it can be delivered. Guidance on planning and running individual, group and workshop training is provided.